Listen

Description

HANDLING HIDDEN DATA

Technology savvy criminals use various methods to hide incriminating information.

  1. Hidden files and folders
  2. System files
  3. Alternate data streams (ADS)

Featuring "keycybr" CI&R Intern "Paladugu Jashwanth". He is currently pursuing his bachelor's of technology in the stream of computer science (2nd year).

Get in touch with him - https://www.linkedin.com/in/paladugu-jashwanth-a28a23150/